Ludwig Nussel discovered that the check_special_mountprog() and
check_special_umountprog() functions call setuid() and setgid() in the
wrong order and do not check the return values, which can lead to
privileges being dropped improperly.

Impact
======

A local attacker may be able to exploit this vulnerability by using
mount helpers such as the mount.nfs program to gain root privileges and
run arbitrary commands.

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@xxxxxxxxxx or alternatively, you may file a bug athttp://bugs.gentoo.org.

util-linux and data encryption... I'm posting here because util-linux is at kernel.org. ... Today, trying to mount the file, 'mount' claimed ... How do I encrypt important data for the future? ... send the line "unsubscribe linux-kernel" in ...(Linux-Kernel)

mount-2.12r-ggk.tar.gz... The present situation of util-linux and mount is not quite clear to me. ... On kernel.org under utils/util-linux nothing has happened for over a year, ... a patch to add support for shared subtrees to the mount from ...(Linux-Kernel)

Re: FC5 upgrade - No mount privileges... Did you click on the dvd icon you can find in nautilus? ... install more software from the DVD and was unable to mount the CD/DVD. ... but both continue to give the 'no privileges' error message....(Fedora)